ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory
☆26Feb 29, 2020Updated 6 years ago
Alternatives and similar repositories for golden-frieza
Users that are interested in golden-frieza are comparing it to the libraries listed below
Sorting:
- Standalone Windows tool to automatically retrieve Sysinternals' AD Explorer search output from the ListView control and save/copy to clip…☆38Apr 12, 2016Updated 9 years ago
- ☆22May 29, 2020Updated 5 years ago
- Windows DLL injection using rust.☆20Jul 20, 2016Updated 9 years ago
- This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-…☆87Jul 2, 2019Updated 6 years ago
- Code snippets from my blog☆29Oct 13, 2025Updated 4 months ago
- ☆25May 9, 2021Updated 4 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- Shikata ga nai (仕方がない) encoder ported into go with several improvements☆31Jan 28, 2026Updated last month
- A simple python reverse shell written just for fun.☆62Feb 6, 2023Updated 3 years ago
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 3 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Apr 23, 2020Updated 5 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆284Oct 29, 2024Updated last year
- Security Research☆36Dec 23, 2021Updated 4 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆75Feb 7, 2021Updated 5 years ago
- In 'n Out - See what goes in and comes out of PEs☆35May 12, 2022Updated 3 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- A Tor Pluggable Transport that shields Tor users from passive and active correlation attacks by employing WebRTC-based covert channels an…☆11Dec 9, 2025Updated 3 months ago
- Resolve bulk host file list to IP addresses, ASN, and validate DNS.☆39Apr 25, 2025Updated 10 months ago
- Script for emulating Arm firmware in QEMU, including a binary for hooking functions for certain Tenda firmware versions that are not stra…☆30Mar 23, 2020Updated 5 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆38Jul 15, 2021Updated 4 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- Code for my collection of predictors/classifiers/etc☆14Jul 18, 2024Updated last year
- A curated list of tools and techniques written from experience in weaponization of malware☆41Oct 26, 2023Updated 2 years ago
- This library is for simplified work with the sms-man.com API☆18Jan 18, 2022Updated 4 years ago
- simple and clean ip look up with bootstrap template☆131Sep 30, 2020Updated 5 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 6 years ago
- ☆17Mar 3, 2026Updated last week
- ☆15Sep 4, 2024Updated last year
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Embedded async HTTP 1.1 server based on a source code from https://github.com/splunk/pion☆13Jan 20, 2021Updated 5 years ago
- A collection of useful PowerShell tools to collect, organize, and visualize Sysmon event data☆39Mar 23, 2020Updated 5 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆91May 10, 2020Updated 5 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆43Jun 27, 2022Updated 3 years ago
- Risk Based Alerting Supporting Add-On (SA) for Splunk☆44Oct 28, 2021Updated 4 years ago
- 基于Linux c开发的插件式扫描器(Python/lua)☆35Feb 27, 2016Updated 10 years ago